메뉴 건너뛰기




Volumn 1233, Issue , 1997, Pages 334-347

Oblivious transfers and privacy amplification

Author keywords

Information theoretic security; Oblivious transfer; Privacy amplification; Reduction between protocols

Indexed keywords

CRYPTOGRAPHY; INFORMATION THEORY;

EID: 84957360961     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-69053-0_23     Document Type: Conference Paper
Times cited : (32)

References (21)
  • 2
    • 0023985539 scopus 로고
    • Privacy amplification by public discussion
    • C.H. Bennett, G. Brassard and J.-M. Robert, “Privacy amplification by public discussion”, SIAM Journal on Computing, Vol. 17, no. 2, April 1988, pp. 210-229.
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 210-229
    • Bennett, C.H.1    Brassard, G.2    Robert, J.-M.3
  • 7
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • J. L. Carter and M. N. Wegman, “New hash functions and their use in authentication and set equality”, Journal of Computer and System Sciences, Vol. 22, 1981, pp. 265-279.
    • (1981) Journal of Computer and System Sciences , vol.22 , pp. 265-279
    • Carter, J.L.1    Wegman, M.N.2
  • 8
    • 0348132170 scopus 로고
    • Linear intersecting codes
    • G.D. Cohen and A. Lempel, “Linear intersecting codes”, Discrete Mathematics, Vol. 56, 1985, pp. 35-43.
    • (1985) Discrete Mathematics , vol.56 , pp. 35-43
    • Cohen, G.D.1    Lempel, A.2
  • 9
    • 0028550581 scopus 로고
    • Intersecting codes and independent families
    • G. D. Cohen and G. Zemor, “Intersecting codes and independent families”, IEEE Transactions on Information Theory, Vol. 40, no. 6, November 1994, pp. 1872-1881.
    • (1994) IEEE Transactions on Information Theory , vol.40 , Issue.6 , pp. 1872-1881
    • Cohen, G.D.1    Zemor, G.2
  • 14
    • 21144435910 scopus 로고
    • Efficient reductions among oblivious transfer protocols based on new self-intersecting codes
    • Springer-Verlag
    • C. Crepeau and M. Santha, “Efficient reductions among oblivious transfer protocols based on new self-intersecting codes”, Sequences II, Methods in Communications, Security and Computer Science, Springer-Verlag, 1991, pp. 360-368.
    • (1991) Sequences II, Methods in Communications, Security and Computer Science , pp. 360-368
    • Crepeau, C.1    Santha, M.2
  • 15
    • 0020878801 scopus 로고
    • A randomized protocol for signing contracts
    • Plenum Press, New York
    • S. Even, O. Goldreich and A. Lempel, “A randomized protocol for signing contracts”, Proceedings of Crypto 82, Plenum Press, New York, 1983, pp. 205-210.
    • (1983) Proceedings of Crypto 82 , pp. 205-210
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 16
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof-systems
    • S. Goldwasser, S. Micali and C. Rackoff, “The knowledge complexity of interactive proof-systems”, SIAM Journal on Computing, Vol. 18, 1989, pp. 186-208.
    • (1989) SIAM Journal on Computing , vol.18 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 18
    • 0003462641 scopus 로고
    • Technical Memo TR-81, Aiken Computation Laboratory, Harvard University
    • M. O. Rabin, “How to exchange secrets by oblivious transfer”, Technical Memo TR-81, Aiken Computation Laboratory, Harvard University, 1981
    • (1981) How to Exchange Secrets by Oblivious Transfer
    • Rabin, M.O.1
  • 21
    • 0001998264 scopus 로고
    • Conjugate coding
    • Original manuscript written circa 1970
    • S. Wiesner, “Conjugate coding”, Sigact News, Vol. 15, no. 1, 1983, pp. 78-88. Original manuscript written circa 1970.
    • (1983) Sigact News , vol.15 , Issue.1 , pp. 78-88
    • Wiesner, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.